Hook Android Trojan Now Delivers Ransomware-Style Attacks – Dark Reading
New features to take over smartphones and monitor user activity demonstrate the continued evolution of the malware, which is now being spread on GitHub. – Read More
New features to take over smartphones and monitor user activity demonstrate the continued evolution of the malware, which is now being spread on GitHub. – Read More
Until businesses begin to account for uncontrolled variables in their threat models, attackers will continue to exploit the weakest link in the chain. – Read More
Lab-Dookhtegen claims major attack on more than 60 cargo ships and oil tankers belonging to two Iranian companies on US sanctions list. – Read More
The chairman sent letters out to companies like Apple, Meta, and Microsoft, advising them not to adhere to the demands of foreign governments to weaken their encryption. – Read More
Because instructions appear to come from AI-generated content summaries and not an external source, the victim is more likely to follow them without suspicion. – Read More
Attackers not only steal credentials but also can maintain long-term, persistent access to corporate networks through the global campaign. – Read More
As threats intensify and cloud adoption expands, organizations must leave outdated security models behind. – Read More
A Chinese APT is going where most APTs don’t: deep into the cloud, compromising supply chains and deploying uncommon malware. – Read More
A bug in the control board that connects peripheral devices in commonly used Dell laptops allowed malicious access all the way down to the firmware running on the device chip,…
Music tastes, location information, even encrypted messages — Apple’s servers are gathering a “surprising” amount of personal data through Apple Intelligence, Lumia Security’s Yoav Magid warns in his new analysis.…
The operation disrupted countless scams, and authorities seized a significant amount of evidence and recovered nearly $100 million in lost funds. – Read More
CVE-2025-43300 is the latest zero-day bug used in cyberattacks against “targeted individuals,” which could signify spyware or nation-state hacking. – Read More
The growing ecosystem of agents, chatbots, and machine credentials that outnumber human users by an order of magnitude is creating a poorly understood but potentially major security issue. – Read…
Some insurers look to limit payouts to companies that don’t remediate serious vulnerabilities in a timely manner. Unsurprisingly, most companies don’t like those restrictions. – Read More
AI-assisted security reviews from Anthropic and others could help level up enterprise application security in the era of vibe coding. – Read More